Flexible network architectures: security issues and principles
The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections fo...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, London, New York
CRC Press
2018
|
Ausgabe: | First edition |
Schriftenreihe: | Communications and networking
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet... |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXV, 297 Seiten Diagramme 25 cm |
ISBN: | 9781138505438 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045296469 | ||
003 | DE-604 | ||
005 | 20190731 | ||
007 | t | ||
008 | 181119s2018 xxu|||| |||| 00||| eng d | ||
010 | |a 017057557 | ||
020 | |a 9781138505438 |9 978-1-138-50543-8 | ||
035 | |a (OCoLC)1028978795 | ||
035 | |a (DE-599)BVBBV045296469 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 |a DE-739 | ||
050 | 0 | |a TK5105.52 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Rudra, Bhawana |4 aut | |
245 | 1 | 0 | |a Flexible network architectures |b security issues and principles |c Bhawana Rudra |
250 | |a First edition | ||
264 | 1 | |a Boca Raton, London, New York |b CRC Press |c 2018 | |
264 | 4 | |c © 2018 | |
300 | |a XXV, 297 Seiten |b Diagramme |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Communications and networking | |
500 | |a Includes bibliographical references and index | ||
520 | |a The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet... | ||
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, e-book |z 978-1-35102830-1 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030683710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030683710 |
Datensatz im Suchindex
_version_ | 1804179077919145984 |
---|---|
adam_text | Contents Foreword..................................................................... Author ................................................................................................................... xiii xv Preface...................................................................................................................... xvii List of Figures...................................................................................................... List of Tables...................................................... Contributors............................................................................... 1 Putting the Internet Forward to the Next Level ....................................... 1.1 1.2 1.3 1.4 1.5 1.6 Introduction....................................................................................... Ideas for Current Internet................................... Internet Design Goals and Principles ..............................; . . . . 1.3.1 Design Goals of Internet . .................. 1.3.2 Internet Design Principles................. 1.3.3 Initiative toward OSI Reference Model.............................. Internet Architectural Principles . ....................................... The Internet of Today ......................................... “Patch-Work” Approaches for Current Internet Conflicts: Critical Review ............................................................................................. 1.6.1 Multicast Routing Limitations............................................. 1.6.2 ATM
Limitations.................................................................. 1.6.3 Inter-Domain Routing Limitations....................................... 1.6.4 Network Layer-Specific Time IntervalLimitations............. 1.6.5 Long-Term Problems......................................................... 1.6.6 Medium-Term Problems ................................................... xix xxiii xxv 1 1 2 4 5 5 6 7 10 11 14 14 15 15 15 16 vii
viii ■ Contents 1.6.7 Short-Term Problems............................................................ Avoiding New Generation Packet Network Limitations ... Security Hitches of Current Internet Architecture................ 1.6.9.1 IPSec Limitations................................................... 1.6.9.2 IPv4, IPv6 and ND Limitations.............................. 1.6.9.3 Common Attacks in IPv4 and IPv6 ....................... 1.6.9.4 Security and Trust Limitations .................... 1.7 Summary................................................................................................ 17 17 17 18 18 19 20 22 Future Internet Global Standardization—State of Play....................... 23 2.1 2.2 2.3 2.4 Introduction............................................................................................ Architectural Review Approaches for Current Internet ................... Need of Network Architecture............................................................ Future Internet Research Issues and Challenges................................ 2.4.1 Network Foundation Challenges............................................. 2.4.2 Pillar Challenges...................................................................... 2.4.3 Vision of Future Internet......................................................... 2.5 Future Internet Initiatives...................................................................... 2.6 Network Architecture: Recent Advances ......................................... 2.6.1 RBA: Role Based Architecture ................................................
2.6.2 ANA: Autonomic Network Architecture......................... ... . 2.6.3 RNA: Recursive Network Architecture ................................ 2.6.4 SILO: Service Integration and controL Optimization .... 2.6.5 CGN: Content Centric Network............................................ 2.6.6 AKARI Future Internet............................................................ 2.6.7 NDN: Named Data Networking............................................. 2.6.8 Mobility First . ......................................................................... 2.6.9 NEBULA................................................................................... 2.6.10 XIA: expressive Internet Architecture................................... 2.6.11 PONA: Policy Oriented Naming Architecture...................... 2.6.12 RINA: Recursive Inter Network Architecture...................... 2.6.13 GENI: Global Environment for Network Innovations/ FIND: Future Internet Design............................................................ 2.6.14 ChoiceNet ............... 2.6.15 SOA: Service Oriented Architecture...................................... 2.6.16 FIA: Future Internet Assembly................................................ ■ 2.6.17 SONATE: Service Oriented Network Architecture............. 2.7 Summary............................................................................................... 23 23 27 28 28 31 33 34 34 36 37 37 38 38 38 39 40 40 40 41 41 Appendix—2A............................................................ ......................................... 57 1.6.8 1.6.9 2 41 42 42 45 47
56
Contents 3 Security in Future Internet Architecture........................... .................... 69 3.1 3.2 3.3 3.4 3.5 69 69 70 72 73 73 74 74 74 76 77 79 79 79 80 81 82 83 83 83 86 86 87 87 87 87 89 89 90 91 92 93 Introduction...................................................................................... Security.................................................................... Pillars of Security . ..................... Basic Concepts of Security............................................................... Attacks............................................................................................. 3.5.1 Threat.................................................................................... 3.5.2 Vulnerabilities..................................................................... 3.5.3 Risk................. 3.6 IP Security Threats........................................................................... 3.6.1 Passive Attacks..................................................................... 3.6.2 Active Attacks . . ........................................................ 3.7 Security Services and Mechanisms ................................................ 3.7.1 Security Services . ........................ 3.7.1.1 Authentication Service ........................................ 3.7.1.2 Access Control. ................................................... 3.7.1.3 Confidentiality ................................. 3.7.1.4 Integrity................................................................ 3.7.1.5 Nonrepudiation .................. 3.7.1.6
Availability ................................. :.................... 3.7.2 Security Mechanisms............................................................ 3.8 IP Security —Layerwise.................................................................. 3.8.1 Application Layer.................... 3.8.2 Transport Layer. .................. 3.8.3 Network Layer..................................................................... 3.8.4 Data Link Layer . . ............................................................ 3.9 Security Approaches for Future Internet.......................................... 3.9.1 Security Establishment Proposal.......................................... 3.9.2 Risk Level Determination ................................................... 3.9.3 Future Internet- Objectives of Security.............................. 3.9.4 Security Requirements.................................................. 3.10 Security Requirements—SONATE................................................... 3.11 Summary.................. ................................................................. .. . Appendix—ЗА.......................................................................... 4 Яix 95 Significance of Authentication—Future Internet Architecture . . . . 115 4.1 4.2 4.3 4.4 Introduction...................................................................................... What is Authentication? ..................................................... Challenges in Secure Authentication .......................................... Authentication Protocols
.................................................................. 4.4.1 Authentication Threats.......................................................... 4.4.1.1 Protocol Threats.......................... 115 115 116 116 116 116
x ■ Contents 4.4.1.2 Encryption Technique Problems........................... 4.4.1.3 Resistance to Threats............................................. 4.4.2 Authentication Mechanisms.................................................. 4.4.2.1 Shared Secrets (Passwords).................................... 4.4.2.2 One Time Passwords (OTP) . . . .......................... 4.4.2.3 Soft Tokens or Certificates . . ............................. 4.4.2.4 Hardware Tokens................................................... 4.4.2.5 Lightweight Directory Access Protocol (LDAP) Authentication............................ 4.4.2.Ö Biometric Authentication....................................... 4.4.2.7 Public Key Infrastructure (PKI) .......................... 4.4.2.8 CASCADED Authentication................................ Future Internet —Authentication Objectives...................................... 4.5.1 Authentication Mechanism in SONATE—Case Study . . . 4.5.2 SONATE —Public Key Infrastructure (PKI).......................... 4.5.2.1 PKI Cryptographic Resources .............................. 4.5.2.2 Components of PKI ... ................ ...................... 4.5.3 Architecture for the Identity Management of the Entities . . 4.5.3.1 Service Consumer Identity ................................... 4.5.3.2 Service Broker’s Identity...................................... 4.5.3.3 Service Provider’s Identity . . . .......................... 4.5.4 SONATE: Generation of the Keys .......................................... 4.5.4.1 PKI Consumer Functionalities ............................. 4.5.4.2 Key
Establishment Process................................... 4.5.5 Certificate Management Service—SONATE...................... 4.5.5.1 SONATE-Certificate Request Process................ 4.5.5.2 SONATE-Certificate Revocation Process .... 4.5.5.3 SONATE -Certificate Verification Process .... 4.5.6 Secure Communication Model for SONATE . ....................... 4.5.7 Functional Overview ................................................................ 4.5.7.1 SONATE Packet Format.......................................... Evaluation ............................................................ 4.6.1 Performance Analysis......................... Summary............................................................................................... 120 121 121 122 123 123 125 126 127 127 128 129 129 129 130 130 130 130 131 132 134 134 136 141 141 145 Appendix—4A...................................................................................................... 147 5 ....................................... 179 Introduction............................................................................................ Need of Authorization......................................................................... Access Control Mechanisms................................................................ 5.3.1 Access Control Matrix (ACM)................................................ 5.3.2 Access Control Lists (ACL) . . ............................................. 5.3.3 Identity-Based Access Control (IBAC) ................................ 179 179 181 182 182 184 4.5 4.6 4.7
Authorization—Future Internet Architecture 5.1 5.2 5.3 117 117 118 118 119 119 120
Contents 5.4 5.5 5.6 5.7 5.8 6 xi 5.3.4 Authorization-Based Access Control (ABAC)..................... 184 5.3.5 Rule-Based Access Control (R-BAC)................................. 184 5.3.6 Policy-Based Access Control (PBAC)................................. 185 5.3.7 Discretionary Access Controls (DAC) . . . . ..................... 185 5.3.8 Mandatory Access Controls (MAC) .՛.....՛............. 186 5.3.9 Role-Based Access Control (RBAC) . . . ........................... 187 SONATE —Access Control Mechanism Model for Distributed Net works Case Study . . . .................................................................. 189 5.4.1 Role-Based Access Control (RBAC) to suite SONATE: ... 190 5.4.2 Mandatory Access Control (MAC) to suite SONATE:.... 192 Access Control Operations for SONATE . . . ..................... 196 5.5.1 Access Control Conditions............................................... . 199 5.5.2 Access Control Functions ................................................... 199 5.5.2.1 Function (PF1): Read.............. .............................. 200 5.5.2.2 Function (PF2): Write.............. .............................. 200 5.5.2.3 Function (PF3): Get Execute..................................201 5.5.2.4 Function (PF4): Cancel the Access Permissions (am) ............................................. 201 5.5.2.5 Function (PF5): Development of an Application . 202 5.5.2.6 Function (PF6): Deletion of an Application .... 203 5.5.2.7 Function (PF7): Change Security Level of an Ap plication .................. 203 5.5.2.8 Function (PF8): Change Current Security
Level of Principal ........................................................ 203 Convergence of Services............ .. .............. .. . . ; .................. 204 5.6.1 Pointwise Convergence of Service Request.............. .. 204 5.6.2 Almost Sure Convergence of Service Request..................... 205 Secure Service Compositon - Read permission .................... 205 Summary............................................................................................. 207 Intrusion Detection and Prevention Systems—Future Internet Architecture................................................................. 6.1 6.2 6.3 6.4 Я 211 Introduction............ .. ...........................................................................211 Intrusion Detection and Prevention System (IDPS) ........................ 212 Why to Use Intrusion Detection and PreventionSystem (ШРЅ) . . 213 IDPS Methods......................................................... 214 6.4.1 Host-Based Instrusion Detection and Prevention System (HIDPS) ................................................................................. 214 6.4.2 Network-Based Instrusion Detection and Prevention System (NIDPS) .............................................................................. 215 6.4.3 Signature-Based Detection................................................... 216 6.4.4 Anamoly Detection............................................................ 216 6.4.4.1 Protocol Anamoly-Based Intrusion Detection . . 217 6.4.4.2 Traffic Anamoly-Based Intrusion Detection . . . 217
xii ■ Contents 6.4.4.3 Stateful Protocol Anamoly Based Intrusion Detec tion ...................... 217 6.4.4.4 Stateful Matching Intrusion Detection System . . 218 6A4.5 Statistical Anamoly Based Detection....................... 218 6.5 Log File Monitor (LEM) ............................................ 219 6.6 Intrusion Detection and Prevention System (IDPS) Response .... 219 6.7 DoS and Types of DoS Attacks . ....................................................220 6.7.1 Semantic Attacks and Flooding Attacks....................................221 6.7.2 DoS/DDoS Attacks....................................................................221 6.7.3 DNS Reflector Attack...................... 222 6.7.4 Permanent Denial of Service Attack (PDoS)..............................223 6.7.5 DoS Targets.................................. 223 6.7.6 Recent Attacks......................................................................... 223 6.7.7 Classification of Defense Techniques of DoS...................... 225 6.7.7.1 Detection Techniques............................................ 225 6.7.7.2 DoS Prevention Techniques.................................. 226 6.8 DoS Attack in SONATE ¿ ............................................. 227 6.9 DoS Detection and Prevention Mechanism for SONATE.................... 228 6.9.1 Detection State .......................................................................... 229 6.9.2 Prevention State . ......................................... 232 6.10 Discussion and Results .......................................................................... 235
6.10.1 DoS Detection Building Block (DDBB) Class...........................237 6.10.1.1 Alert Class ................................................................ 237 6.10.2 DoS Filter Building Block (DFBB)...................................... 238 6.10.2.1 Filter Class............................ 239 6.11 Summary................... ... . . ................................................................240 Appendix-6A.............................................................................................................243 Glossary ................................................................................................................... 257 References................................................................................................................ 263 List of Abbreviations ............................................................................................. 287 Index........................................................ 295
|
any_adam_object | 1 |
author | Rudra, Bhawana |
author_facet | Rudra, Bhawana |
author_role | aut |
author_sort | Rudra, Bhawana |
author_variant | b r br |
building | Verbundindex |
bvnumber | BV045296469 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.52 |
callnumber-search | TK5105.52 |
callnumber-sort | TK 45105.52 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)1028978795 (DE-599)BVBBV045296469 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02739nam a2200481 c 4500</leader><controlfield tag="001">BV045296469</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190731 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181119s2018 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017057557</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138505438</subfield><subfield code="9">978-1-138-50543-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028978795</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045296469</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.52</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rudra, Bhawana</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Flexible network architectures</subfield><subfield code="b">security issues and principles</subfield><subfield code="c">Bhawana Rudra</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, London, New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 297 Seiten</subfield><subfield code="b">Diagramme</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications and networking</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, e-book</subfield><subfield code="z">978-1-35102830-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030683710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030683710</subfield></datafield></record></collection> |
id | DE-604.BV045296469 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:14:08Z |
institution | BVB |
isbn | 9781138505438 |
language | English |
lccn | 017057557 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030683710 |
oclc_num | 1028978795 |
open_access_boolean | |
owner | DE-11 DE-739 |
owner_facet | DE-11 DE-739 |
physical | XXV, 297 Seiten Diagramme 25 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
series2 | Communications and networking |
spelling | Rudra, Bhawana aut Flexible network architectures security issues and principles Bhawana Rudra First edition Boca Raton, London, New York CRC Press 2018 © 2018 XXV, 297 Seiten Diagramme 25 cm txt rdacontent n rdamedia nc rdacarrier Communications and networking Includes bibliographical references and index The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet... Computer network architectures Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe, e-book 978-1-35102830-1 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030683710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Rudra, Bhawana Flexible network architectures security issues and principles Computer network architectures Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Flexible network architectures security issues and principles |
title_auth | Flexible network architectures security issues and principles |
title_exact_search | Flexible network architectures security issues and principles |
title_full | Flexible network architectures security issues and principles Bhawana Rudra |
title_fullStr | Flexible network architectures security issues and principles Bhawana Rudra |
title_full_unstemmed | Flexible network architectures security issues and principles Bhawana Rudra |
title_short | Flexible network architectures |
title_sort | flexible network architectures security issues and principles |
title_sub | security issues and principles |
topic | Computer network architectures Computer networks Security measures Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer network architectures Computer networks Security measures Rechnernetz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030683710&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rudrabhawana flexiblenetworkarchitecturessecurityissuesandprinciples |